CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 52
A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the log
files generated by servers, network devices, and even other IDPSs.
•
Question 22
New systems can respond to an incident threat autonomously, based on
preconfigured options that go beyond simple defensive actions usually
associated with IDPS and IPS systems. These systems, referred to as
____, use a combination of resources to detect an intrusion and then to
trace the intrusion back to its source.
•
Question 23
The ____ is a federal law that creates a general prohibition on the
realtime monitoring of traffic data relating to communications.
•
Question 24
In an attack known as ____, valid protocol packets exploit poorly
configured DNS servers to inject false information to corrupt the
servers’ answers to routine DNS queries from other systems on that
network.